-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2023:4130-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2023:4130 Issue date: 2023-07-18 CVE Names: CVE-2023-1281 CVE-2023-32233 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat CodeReady Linux Builder EUS (v.8.6) - aarch64, ppc64le, x86_64 Red Hat Enterprise Linux BaseOS EUS (v.8.6) - aarch64, noarch, ppc64le, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281) * kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * RHEL8.4 - s390/smp,vdso: fix ASCE handling (BZ#2176464) * After powerstore LUNs are mapped, OS crashed and host reboot. (BZ#2179068) * qla2xxx NVMe-FC: WARNING: CPU: 0 PID: 124072 at drivers/scsi/qla2xxx/qla_init.c:70 qla2xxx_rel_done_warning+0x25/0x30 [qla2xxx] (BZ#2181529) * iscsi target deadlocks when the same host acts as an initiator to itself (i.e. connects via 127.0.0.1) (BZ#2182095) * Dying percpu kworkers cause issues on isolated CPUs [rhel-8] (BZ#2189597) * Azure RHEL8: Live resize of disk does not trigger a rescan of the device capacity (BZ#2192345) * RHEL8.4 - kernel: fix __clear_user() inline assembly constraints (BZ#2192604) * RHEL8.6, lockd : oops on nlmsvc_mark_host (BZ#2196386) * xfs: deadlock in xfs_btree_split_worker (BZ#2196392) * Intel E810 card unable to create a MACVLAN on interface already configured as SRIOV (BZ#2203217) * ice: ptp4l cpu usage spikes (BZ#2203287) * Kernel - Significant performance drop for getrandom system call when FIPS is enabled (compared to RHEL 8.x for all x < 6.z) (BZ#2208130) * Azure RHEL8: CVM patch list requirement-storvsc patch (BZ#2208601) * BUG_ON "kernel BUG at mm/rmap.c:1041!" in __page_set_anon_rmap() when vma->anon_vma==NULL (BZ#2211661) * RHEL 8.6 opening console with mkvterm on novalink terminal fails due to drmgr reporting failure (L3:) (BZ#2212374) * ESXi RHEL8: Haswell generation CPU are impacted with performance due to IBRS (BZ#2213367) * Hyper-V RHEL-8: Fix VM crash/hang Issues due to fast VF add/remove events (BZ#2216544) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 2181847 - CVE-2023-1281 kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation 2196105 - CVE-2023-32233 kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation 6. Package List: Red Hat Enterprise Linux BaseOS EUS (v.8.6): Source: kernel-4.18.0-372.64.1.el8_6.src.rpm aarch64: bpftool-4.18.0-372.64.1.el8_6.aarch64.rpm bpftool-debuginfo-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-core-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-cross-headers-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-debug-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-debug-core-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-debug-debuginfo-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-debug-devel-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-debug-modules-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-debug-modules-extra-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-debuginfo-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-devel-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-headers-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-modules-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-modules-extra-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-tools-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-tools-debuginfo-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-tools-libs-4.18.0-372.64.1.el8_6.aarch64.rpm perf-4.18.0-372.64.1.el8_6.aarch64.rpm perf-debuginfo-4.18.0-372.64.1.el8_6.aarch64.rpm python3-perf-4.18.0-372.64.1.el8_6.aarch64.rpm python3-perf-debuginfo-4.18.0-372.64.1.el8_6.aarch64.rpm noarch: kernel-abi-stablelists-4.18.0-372.64.1.el8_6.noarch.rpm kernel-doc-4.18.0-372.64.1.el8_6.noarch.rpm ppc64le: bpftool-4.18.0-372.64.1.el8_6.ppc64le.rpm bpftool-debuginfo-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-core-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-cross-headers-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-debug-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-debug-core-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-debug-debuginfo-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-debug-devel-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-debug-modules-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-debug-modules-extra-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-debuginfo-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-devel-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-headers-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-modules-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-modules-extra-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-tools-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-tools-debuginfo-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-tools-libs-4.18.0-372.64.1.el8_6.ppc64le.rpm perf-4.18.0-372.64.1.el8_6.ppc64le.rpm perf-debuginfo-4.18.0-372.64.1.el8_6.ppc64le.rpm python3-perf-4.18.0-372.64.1.el8_6.ppc64le.rpm python3-perf-debuginfo-4.18.0-372.64.1.el8_6.ppc64le.rpm s390x: bpftool-4.18.0-372.64.1.el8_6.s390x.rpm bpftool-debuginfo-4.18.0-372.64.1.el8_6.s390x.rpm kernel-4.18.0-372.64.1.el8_6.s390x.rpm kernel-core-4.18.0-372.64.1.el8_6.s390x.rpm kernel-cross-headers-4.18.0-372.64.1.el8_6.s390x.rpm kernel-debug-4.18.0-372.64.1.el8_6.s390x.rpm kernel-debug-core-4.18.0-372.64.1.el8_6.s390x.rpm kernel-debug-debuginfo-4.18.0-372.64.1.el8_6.s390x.rpm kernel-debug-devel-4.18.0-372.64.1.el8_6.s390x.rpm kernel-debug-modules-4.18.0-372.64.1.el8_6.s390x.rpm kernel-debug-modules-extra-4.18.0-372.64.1.el8_6.s390x.rpm kernel-debuginfo-4.18.0-372.64.1.el8_6.s390x.rpm kernel-debuginfo-common-s390x-4.18.0-372.64.1.el8_6.s390x.rpm kernel-devel-4.18.0-372.64.1.el8_6.s390x.rpm kernel-headers-4.18.0-372.64.1.el8_6.s390x.rpm kernel-modules-4.18.0-372.64.1.el8_6.s390x.rpm kernel-modules-extra-4.18.0-372.64.1.el8_6.s390x.rpm kernel-tools-4.18.0-372.64.1.el8_6.s390x.rpm kernel-tools-debuginfo-4.18.0-372.64.1.el8_6.s390x.rpm kernel-zfcpdump-4.18.0-372.64.1.el8_6.s390x.rpm kernel-zfcpdump-core-4.18.0-372.64.1.el8_6.s390x.rpm kernel-zfcpdump-debuginfo-4.18.0-372.64.1.el8_6.s390x.rpm kernel-zfcpdump-devel-4.18.0-372.64.1.el8_6.s390x.rpm kernel-zfcpdump-modules-4.18.0-372.64.1.el8_6.s390x.rpm kernel-zfcpdump-modules-extra-4.18.0-372.64.1.el8_6.s390x.rpm perf-4.18.0-372.64.1.el8_6.s390x.rpm perf-debuginfo-4.18.0-372.64.1.el8_6.s390x.rpm python3-perf-4.18.0-372.64.1.el8_6.s390x.rpm python3-perf-debuginfo-4.18.0-372.64.1.el8_6.s390x.rpm x86_64: bpftool-4.18.0-372.64.1.el8_6.x86_64.rpm bpftool-debuginfo-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-core-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-cross-headers-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-debug-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-debug-core-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-debug-debuginfo-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-debug-devel-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-debug-modules-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-debug-modules-extra-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-debuginfo-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-devel-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-headers-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-modules-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-modules-extra-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-tools-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-tools-debuginfo-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-tools-libs-4.18.0-372.64.1.el8_6.x86_64.rpm perf-4.18.0-372.64.1.el8_6.x86_64.rpm perf-debuginfo-4.18.0-372.64.1.el8_6.x86_64.rpm python3-perf-4.18.0-372.64.1.el8_6.x86_64.rpm python3-perf-debuginfo-4.18.0-372.64.1.el8_6.x86_64.rpm Red Hat CodeReady Linux Builder EUS (v.8.6): aarch64: bpftool-debuginfo-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-debug-debuginfo-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-debuginfo-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-tools-debuginfo-4.18.0-372.64.1.el8_6.aarch64.rpm kernel-tools-libs-devel-4.18.0-372.64.1.el8_6.aarch64.rpm perf-debuginfo-4.18.0-372.64.1.el8_6.aarch64.rpm python3-perf-debuginfo-4.18.0-372.64.1.el8_6.aarch64.rpm ppc64le: bpftool-debuginfo-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-debug-debuginfo-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-debuginfo-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-tools-debuginfo-4.18.0-372.64.1.el8_6.ppc64le.rpm kernel-tools-libs-devel-4.18.0-372.64.1.el8_6.ppc64le.rpm perf-debuginfo-4.18.0-372.64.1.el8_6.ppc64le.rpm python3-perf-debuginfo-4.18.0-372.64.1.el8_6.ppc64le.rpm x86_64: bpftool-debuginfo-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-debug-debuginfo-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-debuginfo-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-tools-debuginfo-4.18.0-372.64.1.el8_6.x86_64.rpm kernel-tools-libs-devel-4.18.0-372.64.1.el8_6.x86_64.rpm perf-debuginfo-4.18.0-372.64.1.el8_6.x86_64.rpm python3-perf-debuginfo-4.18.0-372.64.1.el8_6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2023-1281 https://access.redhat.com/security/cve/CVE-2023-32233 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIbBAEBCAAGBQJktmwHAAoJENzjgjWX9erER6oP9jnSN4MJeD96PCOQdmWUgdD7 oiIComGT0rXk+KnSo/LkE147Qc6peJk2UMLKBXwLb0i36b7vXNzP4KldjoOA+JAp VIKHuCyUp50Ixh5CHgHU8iITRUKimyps+hGwmWYvRKE8XlEJ0r2Z3fcIRVopc/Zv xpqOx/EoPAwVOzLPH2A59uWT9YGuu3OFvxewF9bZTtT73E275vk7IUgBnZm4hr+N lAkk3Gs6BQ/6RFF8liY358NTjOPs80dmQWqHvl0cdrItqmGGtqwvAIzlQazOXn5L 5iinMRAzwIQ0zG4tA+FyoVBL1pJlMZ6pTYNxBw0xCEx1BpfqGASp+aWvUHIS1POz lVJdggTb9IRWPrZQkYO2JooApTlciOdAtEg2cc6fvJtpGR5oMRfOMbIRC36F42kV XlbI9d1HyoxXsFvVEHCIaccAotmXPD6Wpn4FD9cxsGKRaRxUbtn+2KdDUZ+cIae0 CXGb/JUnA7carkHzmtoXLqBxwXyFteZggP5QOHp20lmOP3MWwYe1JofqPkCQYAHa V0I+PExZcUgcyjgljJcAbZm+x3LUfjuWIS4Ipo8ofi2vSu4xtkh49pthuM4/WJAt gi++OcC3Enrsw0REq4AJMqn/nbCdsareo4p2G4U7SKmQIKdNXCGZs9n8omkKNazt CkLVI7SM7bFFIVZqN8k= =c4ba -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce